- Forum
- Issues? Bugs? or just want to say hello?
Issues? Bugs? or just want to say hello?
Welcome! We have recently implemented the comment section to our micro-forums and selectively enable it for some of our posts!
For now, everyone is able to write comments as a 'Guest' user. But to prevent spam, hate comments, or other inappropriate content, we have enabled 'active moderation mode'. This mode requires one of our moderators to approve the comments manually. (Please do not double post comments as it will only slow things down)
Say Something
Now that you are here, you better make use of it! Write down a nice comment, product review, bug, issue, or anything you want to share with the community!
Additionally, we plan to implement OAuth with Discord (or another service) and have logins purely based on this mechanism.
Cheers!
#75, #77, #78, for every issue you face please provide a short description together with a small (!) sample Lua that causes the issue. (You can just post them here as a comment)
Please DOT NOT paste the full script and expect us to fix it.
Please DO limit the amount of code to give the smallest sample possible.
Please DO make sure your code runs in a normal Lua environment first, thanks!
Hey #89,
If this happens it either means it is still/stuck processing, or the analysis has failed without properly returning (usually results in a crash, this is not noticeable as the service restarts itself).
To find out what part of the script may have caused the error please split up your script into smaller chunks and try parsing them one by one until one gives a failure. As you find the function or expression causing the issues you might upload it here and we can re-produce the bug and develop a fix.
Hey #107, I noticed the server often crashes when doing specific requests. Chances are your script caused the crash and you won't get a response at all. Just don't do 30k lines or use less heavy obfuscation.
I can only imagine the resources needed to parse those 30k lines of lua
yo #134, a quick look at the script in question led to the following findings
https://raw.githubusercontent[.]com/TradeScam/TradescamNEW/main/TradeScam.lua named "trade scamme (beta) By Exploit" does loadstring on another script, https://raw.githubusercontent.com/TradeScam/PSXTradeScam/main/PSXTRADESCAMFREE
The new script (also LuaObfuscated) does a Discord webhook to https://discord[.]com/api/webhooks/1033669855108407346/NqeW1V7stjYzziBoBZxc3i21rtb3kMr4G9SyL_GGpyNMRkPItSJVZFHy8DWcT9BWkEqg and more important does another loadstring on https://raw.githubusercontent[.]com/HardGameSs/PSX/main/Script.lua which uses a different obfuscation.
It is unsure what these scripts do exactly, but the multi-payload behavior and the poor Discord webhook might indicate an amature level of script kiddy 'malware'
Thanks for pointing that out, #137
I have modified the code so it prints in a loop:
for number=0, 10 do
local result
if number % 2 == 0 then
result = "even"
else
result = "odd"
end
print(number .. " is " .. result)
end
You did not specify which obfuscation it is, but I narrowed it down to the virtualization. We will take steps to fix this soon-ish, meanwhile keep reporting issues (with obfuscation type), thanks!